General
-
Target
factura solicitada..exe
-
Size
493KB
-
Sample
250217-n6e3aszls7
-
MD5
6124034fe55707e3ec7a9940b36a2640
-
SHA1
fa817c784d46fdcfc065a264713c82f5f53b7288
-
SHA256
aa928f80e184381e6cb9e2a8e159334e3494999165cf97bcd71bdfbb61dce2bf
-
SHA512
6ea1a6caddac4f0696731f42a726a5df960aed0452aa347348805ee46f7e381be1fe4feeb6f79fa01883c248e99190a106e026973eb4dd93ca008605c6e8169e
-
SSDEEP
12288:sUatc/gP29iwihJafg1LUBCLousN3fjAmBmwG:sUatj2MhAB73fjAAmwG
Static task
static1
Behavioral task
behavioral1
Sample
factura solicitada..exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
factura solicitada..exe
Resource
win10v2004-20250207-en
Behavioral task
behavioral3
Sample
Concludence.ps1
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Concludence.ps1
Resource
win10v2004-20250211-en
Malware Config
Extracted
vipkeylogger
Protocol: smtp- Host:
mail.novacitacor.pt - Port:
587 - Username:
[email protected] - Password:
#Novasystem123# - Email To:
[email protected]
https://api.telegram.org/bot7221326078:AAGaWyrW9EKGD1uh5gWS77zyAjwVr5QBesc/sendMessage?chat_id=7159751206
Targets
-
-
Target
factura solicitada..exe
-
Size
493KB
-
MD5
6124034fe55707e3ec7a9940b36a2640
-
SHA1
fa817c784d46fdcfc065a264713c82f5f53b7288
-
SHA256
aa928f80e184381e6cb9e2a8e159334e3494999165cf97bcd71bdfbb61dce2bf
-
SHA512
6ea1a6caddac4f0696731f42a726a5df960aed0452aa347348805ee46f7e381be1fe4feeb6f79fa01883c248e99190a106e026973eb4dd93ca008605c6e8169e
-
SSDEEP
12288:sUatc/gP29iwihJafg1LUBCLousN3fjAmBmwG:sUatj2MhAB73fjAAmwG
-
VIPKeylogger
VIPKeylogger is a keylogger and infostealer written in C# and it resembles SnakeKeylogger that was found in 2020.
-
Vipkeylogger family
-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Event Triggered Execution: Component Object Model Hijacking
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Executes dropped EXE
-
Accesses Microsoft Outlook profiles
-
Blocklisted process makes network request
-
Checks installed software on the system
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Legitimate hosting services abused for malware hosting/C2
-
Looks up external IP address via web service
Uses a legitimate IP lookup service to find the infected system's external IP.
-
Drops file in System32 directory
-
Suspicious use of NtCreateThreadExHideFromDebugger
-
Suspicious use of NtSetInformationThreadHideFromDebugger
-
-
-
Target
Concludence.Cha
-
Size
51KB
-
MD5
1678eaebcc616fdd486b73c0d0f9a765
-
SHA1
8e9d45a247bf04385e368f16ae88ac4c70c5ca4f
-
SHA256
ee054a99730186790f4a20abe48b59b4254b5bb5888b4cf685f7a74092a9a6e6
-
SHA512
7bec8100642738d1cf759f3a5226a5e96defc56697235ef50444d35fdaf82bfab8eed5addbff50b358b9ab7caf5ccbe65cea09d7d0be35a6de7f6614d2b78172
-
SSDEEP
1536:pxAaLXZA+Iki28ydNcQOb01QZKVDxXAJb:px3dAwnXeYdNwJ
Score8/10-
Boot or Logon Autostart Execution: Active Setup
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
-
Downloads MZ/PE file
-
Enumerates connected drives
Attempts to read the root path of hard drives other than the default C: drive.
-
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Active Setup
1Browser Extensions
1Event Triggered Execution
1Component Object Model Hijacking
1Privilege Escalation
Boot or Logon Autostart Execution
1Active Setup
1Event Triggered Execution
1Component Object Model Hijacking
1